Information Privacy Protection under Anti-Money Laundering Legislation: An Empirical Study in Taiwan
Abstract
:1. Introduction
2. Literature Review
2.1. Balancing between Anti-Money Laundering and Personal Information Privacy Protection: Methods Adopted by the EU
- Adopt information privacy impact assessments, such as the ISO standard 22307: 2008 Financial Services-Privacy Impact Assessment.
- The requirement that data should be retained for 5 years is capricious and unsubstantiated by solid evidence, and it should be abolished.
- No massive, repetitive, or nonstructural trans-border transmission of personal information shall be allowed, even if it is in the public interest.
2.2. The US Perspective
- Obligated entities should earmark personnel and establish an internal institution for information privacy protection.De Dios [2] advocated having built-in internal institutions or personnel in obligated entities for resolving information privacy-related disputes, particularly disputes in trans-border information transmission arising from mismatches between a country’s information privacy protection measures and those of a foreign jurisdiction.
- The reporting of suspicious activities should be made immune to certain liabilities through a safe-harbor mechanism, albeit with certain limitations.Giuliano [11] noted that under the United States’ anti-money laundering legal infrastructure, reports of non-malicious anti-money laundering are immune from potential tort liability. Furthermore, Olejar [12] predicted that such safe harbor for non-malicious anti-money laundering reporting would lead to a flood of preventive reports into the system. Such reports cause no harm, whereas not filing such reports can lead to legal threats in the form of civil liability, criminal penalties, and/or follow-up administrative supervision. Surette [13] observed that, in a few cases, the US court even required the filing of reports that were based on reasonable good-faith suspicion.
- Prior judicial supervision mechanisms should be employed before law enforcement acquires personal information.Analyzing the Uniting and Strengthening America by Providing Appropriate Tools to Restrict, Intercept, and Obstruct Terrorism Act of 2001, Gouvin [14] argued that law enforcement can acquire all financial information pertinent to a specific person through the Financial Crimes Enforcement Network. This stipulation de facto treats such acquisition as part of the obligation to report suspicious money laundering activities. This type of information sharing can be easily attained through administrative subpoenas in the US as long as the targeted information is reasonably related to the alleged criminal investigation. This weakened procedural protection of information privacy in the US, unlike constitutional search and/or seizure, is unlikely to survive considering increasing concerns regarding information privacy protection among members of society. Therefore, Gouvin believed that some external independent force should exist to counterbalance the harm caused by such administrative subpoenas. Lee [15] also observed that except in the case of a real threat of an imminent terrorist attack, the administrative subpoena measure for investigating anti-money laundering raises serious concerns about the violation of the principle that ordinary search and seizure must be performed with probable cause as stipulated in the Fourth Amendment of the US Constitution.
- Informed consent should be acquired from the original source of personal information.Lacey and George [16] suggested that informed consent can also ameliorate the harm caused to information privacy protection by anti-money laundering legislation. They proposed that obligated entities should request their clients provide written informed consent upon being notified of the possible acquisition of their personal information for anti-money laundering, considering the obligated entity’s duty to file reports on suspicious activities. Lacey and George further stated that the notification of such informed consent should include a clear definition and lucid explanation (with accompanying illustrations if necessary) of the suspicious behavior.
- The attorney and accountant should have their report-filing duty restrained or be excluded from the definition of obligated entities in anti-money laundering activities.Olejar [12] found that even the Financial Action Task Force on Money Laundering intended to extend attorneys and accountants as obligated entities because of their gatekeeper function, which was an action that would have been met with tremendous societal opposition. Tsai [17] also mentioned that supporters of excluding attorneys and accountants as obligated entities believe that such professionals are likely to make the best judgments and be self-disciplined. Furthermore, the exclusion of attorneys and accountants mitigates the potential for direct conflict between the obligated report-filing duty required by anti-money laundering legislation and the potential attorney (accountant)–client privilege originating from the litigation procedural aspect. Lacey and George [16] indicated that attorneys in the EU are immune from report-filing obligations during the process of building a relationship with their clients as well as in the process of judicial litigation.
3. Research Methodology
3.1. MDM
3.2. AHP
4. Applying the Method to Empirical Analysis
4.1. MDM and Questionnaire Dispersion
4.2. Importance and Consistency Checks of the Criteria and Sub-Criteria
4.3. Comparative Weights of the Criteria, Sub-Criteria, and Alternatives through Applying the AHP
5. Discussion, Policy Implication, and Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Wang, C.C. The trend of development in Money Laundering Control Act—The practical issues of performing anti-money laundering in financial institutions. Taiwan L Rev. 2017, 267, 5–18. [Google Scholar]
- De Dios, M.A. The sixth pillar of anti-money laundering compliance: Balancing effective enforcement with financial privacy. Brook. J. Corp. Fin. Com. L. 2016, 10, 495–520. [Google Scholar]
- Cheng, F.C. The dilemma between preventing money laundering and protecting personal information privacy. Monthly J. Nat’l Atty 2018, 2018, 65–69. [Google Scholar]
- Cheng, F.C. Internet investigation with personal information privacy and its influence to internet services providers. In The Study of Telecommunications, 1st ed.; Liu, K.C., Ed.; New Sharing: Taipei, Taiwan, 2015; Volume 1, pp. 237–266. [Google Scholar]
- Dospinescu, O.; Anastasiei, B.; Dospinescu, N. Key Factors Determining the Expected Benefit of Customers When Using Bank Cards: An Analysis on Millennials and Generation Z in Romania. Symmetry 2019, 11, 1449. [Google Scholar] [CrossRef] [Green Version]
- Meunier, D. Hidden Beneficial Ownership and Control: Canada as a Pawn in the Global Game of Money Laundering, 1st ed.; C.D. Howe Institute: Toronto, ON, Canada, 2018; pp. 1–19. [Google Scholar]
- Chaikin, D. Money Laundering and Tax Evasion—The Assisting of the Banking Sector. In The Handbook of Business and Corruption, 1st ed.; Aßländer, M.S., Hudson, S., Eds.; Emerald Publishing Limited: Bingley, UK, 2017; pp. 237–254. [Google Scholar]
- Voss, W.G.; Woodcock, K.; Dumont, D.; Wells, N.D.; Exor, J.I.; Traça, J.L.; Embry, B.; Khan, F. Privacy, E-commerce, and data security. Int. Lawyer 2012, 46, 97–112. [Google Scholar]
- VanWasshnova, M.R. Data protection conflicts between the United States and the European Union in the war on terror—Lessons learned from the existing system of financial information exchange. Case West. Reserve J. Int. Law 2008, 39, 827–865. [Google Scholar]
- Guidelines on Data Protection in EU Financial Services Regulation. European Data Protection SupervisorWeb. 2014. Available online: https://edps.europa.eu/sites/edp/files/publication/14-11-25_financial_guidelines_en.pdf (accessed on 21 February 2020).
- Giuliano, M.N. 58 Corpus Juris Secundum—Monetary and Currency Regulation §6, 2018th ed.; West: Eagan, MN, USA, 2018; pp. 1–6. [Google Scholar]
- Olejar, R.J. Anti-money laundering v. the right to privacy. N. J. Law 2018, 251, 56–62. [Google Scholar]
- Surette, E.C. Immunity of financial institutions under safe harbor provision of Annunzio-Wylie Anti-Money Laundering Act (31 U.S.C.A. § 5318(g)(3)). A L R Fed 2d 2011, 58, 553–593. [Google Scholar]
- Gouvin, E.J. Are there any checks and balances on the government’s power to check our balances? The fate of financial privacy in the war on terrorism. Temple Pol. Civ. Rights Law Rev. 2005, 14, 517–541. [Google Scholar]
- Lee, C.R. Constitutional cash: Are banks guilty of racial profiling in implementing the United States Patriot Act? Mich. J. Race Law 2006, 11, 557–604. [Google Scholar]
- Lacey, K.A.; George, B.C. Crackdown on money laundering: A comparative analysis of the feasibility and effectiveness of domestic and multilateral policy reforms. Northwestern J. Int. Law Bus. 2003, 23, 263–351. [Google Scholar]
- Tsai, P.L. The recent trend in international anti-money laundering development―the new development in legal compliance for attorneys. Monthly J. Nat’l Atty 2017, 9, 39–50. [Google Scholar]
- Murry, J.W.; Hammons, J.O. Delphi: A versatile methodology for conducting qualitative research. Rev. High. Educ. 1995, 18, 423–436. [Google Scholar] [CrossRef]
- Saaty, T.L. How to make a decision: The analytic hierarchy process. Eur. J. Oper. Res. 1971, 40, 9–10. [Google Scholar]
- Saaty, T.L. The Analytic Hierarchy Process; McGraw-Hill: New York, NY, USA, 1980. [Google Scholar]
- Deng, J.Y.; Tseng, K.H. The characters and applications of Analytic Hierarchy Process (I). J. Chin. Stat. Assoc. 1989, 27, 5–27. [Google Scholar]
- Deng, J.Y.; Tseng, K.H. The characters and applications of Analytic Hierarchy Process (II). J. Chin. Stat. Assoc. 1989, 27, 1–20. [Google Scholar]
- Lee, S.C.; Yoo, S.J.; Lee, S. A study on the consumers’ perception priority regarding the selection attributes of duty free stores applying the AHP. J. Mark. Thought 2016, 3, 8–15. [Google Scholar]
- Emete, T.; Gazibey, Y. Priorities of the citizens in city brand development: Comparison of two cities (Nicosia and Kyrenia) by using analytic hierarchy process (AHP) approach. Qual. Quant. 2018, 52, 413–437. [Google Scholar]
- Cervelló-Royo, R.; Guijarro, F.; Pfahler, T.; Preuss, M. An analytic hierarchy process (AHP) framework for property valuation to identify the ideal 2050 portfolio mixes in EU-27 countries with shrinking populations. Qual. Quant. 2016, 50, 2313–2329. [Google Scholar] [CrossRef] [Green Version]
- Racioppi, V.; Marcarelli, G.; Squillante, M. Modelling a sustainable requalification problem by analytic hierarchy process. Qual. Quant. 2015, 49, 1661–1667. [Google Scholar] [CrossRef]
- Saaty, T.L. How to make a decision: The analytic hierarchy process. Eur. J. Oper. Res. 1990, 48, 9–26. [Google Scholar] [CrossRef]
- Kelly, M.; Maynard-Moody, S. Policy analysis in the post-positivist era: Engaging stakeholders in evaluating the economic development district’s program. Public Adm. Rev. 1993, 53, 135–142. [Google Scholar] [CrossRef]
- Moeller, G.; Shafer, E. The Delphi technique: A tool for long-range tourism and travel planning. In Travel, Tourism, and Hospitality Research―A Handbook for Managers and Researchers; Brent Ritchie, J.R., Golden, C.R., Eds.; Wiley: New York, NY, USA, 1987; pp. 417–424. [Google Scholar]
- Faherty, V. Continuing social work education: Results of a Delphi survey. J. Educ. Soc. Work 1979, 15, 12–19. [Google Scholar] [CrossRef]
- Cavoukian, A. 2011 Annual Report of The Information and Privacy Commissioner of Ontario, 1st ed.; Information and Privacy Commissioner/Ontario: Toronto, ON, Canada, 2011; p. 7. [Google Scholar]
No. | Criteria | Illustration |
---|---|---|
A | Internal control in financial institutions | The Guidelines on Data Protection in EU Financial Services Regulation exemplifies the ISO standard 22307:2008 Financial Services-Privacy Impact Assessment. |
B | Safe-harbor immunity limitation | The reporting of suspicious activities should be made immune to certain liabilities through a safe-harbor mechanism, albeit with certain limitations. |
C | Prior surveillance mechanism | The practice of giving administrative subpoenas is unlikely to survive the constitutional scrutiny considering increasing concerns regarding information privacy protection among members of society. |
D | Informed consent | Informed consent can also ameliorate the harm caused to information privacy protection by anti-money laundering legislation. |
E | Exclusion of attorneys and accountants | Professionals are likely to make the best judgments and be self-disciplined. The exclusion of attorneys and accountants mitigates the potential for direct conflict between the obligated report-filing duty required by anti-money laundering legislation and potential attorney (accountant)–client privilege. |
Sub-Criteria | Reference |
---|---|
(A1) Adopting personal information impact assessments | Guidelines on Data Protection in EU Financial Services Regulation. |
(A2) Incorporating internal institutions or personnel | De Dios [2] |
(B1) No immunity for non-malicious anti-money laundering reporting | Olejar [12] |
(B2) Filing reports to be based on reasonable good-faith suspicion | Surette [13] |
(C1) External independent force for supervision | Gouvin [14] |
(C2) Warrant with probable cause for government acquisition | Lee [15] |
(D1) Informed consent to permanent limitation of information privacy | Lacey and George [16] |
(D2) Informed consent to temporary limitation of information privacy | Guidelines on Data Protection in EU Financial Services Regulation. |
(E1) Professionals are likely to make the best judgments and be self-disciplined | Tsai [17] |
(E2) Immunity in the process of building a relationship with clients and the process of judicial litigation | Lacey and George [16] |
Category of Experts | First Round | Second Round | Third Round | |||
---|---|---|---|---|---|---|
E-Mailed | Collected | E-Mailed | Collected | E-Mailed | Collected | |
Industry | 6 | 5 | 6 | 4 | 6 | 2 |
Government | 3 | 1 | 3 | 1 | 3 | 1 |
Academia | 4 | 4 | 4 | 3 | 4 | 3 |
Total | 13 | 10 | 13 | 8 | 13 | 6 |
Ratio of sent/collected questionnaires | 77% | 62% | 46% |
First Round | Second Round | Third Round | |||||||
---|---|---|---|---|---|---|---|---|---|
Criteria or Sub-Criteria | Importance Average | Interquartile Ranges | Result | Importance Average | Interquartile Ranges | Result | Importance Average | Interquartile Ranges | Result |
A | 5.79 | 0.35 | p | ||||||
B | 5.09 | 0.4 | p | ||||||
C | 5.73 | 0.35 | p | ||||||
D | 5.35 | 0.7 | O | 5.30 | 0.55 | p | |||
E | 3.56 | 1.05 | D | ||||||
A1 | 5.47 | 0.7 | O | 5.21 | 0.5 | p | |||
A2 | 5.15 | 1.05 | O | 5.27 | 0.7 | O | 5.27 | 0.35 | p |
B1 | 4.52 | 0.7 | O | 4.62 | 0.4 | p | |||
B2 | 4.84 | 0.7 | O | 4.86 | 0.4 | p | |||
C1 | 5.47 | 0.7 | O | 5.46 | 0.4 | p | |||
C2 | 4.77 | 1.4 | O | 4.78 | 0.5 | p | |||
D1 | 4.14 | 0.7 | O | 4.52 | 0.5 | p | |||
D2 | 4.52 | 1.05 | O | 4.65 | 0.5 | p | |||
E1 | 3.37 | 1.05 | D | ||||||
E2 | 4.20 | 1.05 | O | 4.12 | 1.05 | O | 3.89 | 1.05 | D |
Criteria | W/p | Sub-Criteria | W/p | Priority |
---|---|---|---|---|
(A) Internal control in financial institutions | 0.263(1) | (A1) Adopting personal information impact assessments | 0.141 | 1 |
(A2) Incorporating internal institutions or personnel | 0.133 | 3 | ||
(B) Safe-harbor immunity limitation | 0.232(4) | (B1) No immunity for non-malicious anti-money laundering reporting | 0.116 | 6 |
(B2) Filing of reports should be based on reasonable good-faith suspicion | 0.124 | 4 | ||
(C) Prior surveillance mechanism | 0.261(2) | (C1) External independent force for supervision | 0.141 | 1 |
(C2) Warrant with probable cause for government acquisition | 0.123 | 5 | ||
(D) Informed consent | 0.243(3) | (D1) Informed consent to permanent limitation of information privacy | 0.106 | 7 |
(D2) Informed consent to temporary limitation of information privacy | 0.116 | 6 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cheng, F.-C.; Wang, S.-M. Information Privacy Protection under Anti-Money Laundering Legislation: An Empirical Study in Taiwan. Mathematics 2020, 8, 1048. https://doi.org/10.3390/math8071048
Cheng F-C, Wang S-M. Information Privacy Protection under Anti-Money Laundering Legislation: An Empirical Study in Taiwan. Mathematics. 2020; 8(7):1048. https://doi.org/10.3390/math8071048
Chicago/Turabian StyleCheng, Fa-Chang, and Su-Man Wang. 2020. "Information Privacy Protection under Anti-Money Laundering Legislation: An Empirical Study in Taiwan" Mathematics 8, no. 7: 1048. https://doi.org/10.3390/math8071048
APA StyleCheng, F. -C., & Wang, S. -M. (2020). Information Privacy Protection under Anti-Money Laundering Legislation: An Empirical Study in Taiwan. Mathematics, 8(7), 1048. https://doi.org/10.3390/math8071048